๐Ÿ” CVE Alert

CVE-2022-49743

UNKNOWN 0.0

ovl: Use "buf" flexible array for memcpy() destination

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ovl: Use "buf" flexible array for memcpy() destination The "buf" flexible array needs to be the memcpy() destination to avoid false positive run-time warning from the recent FORTIFY_SOURCE hardening: memcpy: detected field-spanning write (size 93) of single field "&fh->fb" at fs/overlayfs/export.c:799 (size 21)

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 27, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
cbe7fba8edfc8cb8e621599e376f8ac5c224fa72 < 012cdef22000f3104e4fa8224ad29fde509b8caf cbe7fba8edfc8cb8e621599e376f8ac5c224fa72 < a77141a06367825d639ac51b04703d551163e36c cbe7fba8edfc8cb8e621599e376f8ac5c224fa72 < 07a96977b2f462337a9121302de64277b8747ab1 cbe7fba8edfc8cb8e621599e376f8ac5c224fa72 < cf8aa9bf97cadf85745506c6a3e244b22c268d63
Linux / Linux
5.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/012cdef22000f3104e4fa8224ad29fde509b8caf git.kernel.org: https://git.kernel.org/stable/c/a77141a06367825d639ac51b04703d551163e36c git.kernel.org: https://git.kernel.org/stable/c/07a96977b2f462337a9121302de64277b8747ab1 git.kernel.org: https://git.kernel.org/stable/c/cf8aa9bf97cadf85745506c6a3e244b22c268d63